Report on Production of the day?

Hello expert,
Is it a standard Tcode or report can bring a list of production order details of the day, including component details?
I'd like to use it as pick list (but I do not want to use WM)....
Thx!!!

Dear ,
SAP has lot of beautiful report for your requirement .Please find below some of them :
1.COOIS -Select Order Headers -Standard Profile -Enter Plant Code  and order Type -Enter Actual Start Date To and Actual Finish Date To or any date like Basic Start date To and Basic Finish Date To .Hit execute which will display you the list of production order .
  2.In COOIS -Now For component details , you should select Component from menu detail  , Standrad Profile and with same details as above .Or select Pick List , standard prfoile with same details .Hit execute
3.Or , in COOIS-Select Documents Goods movement -Standard prfile -Order type /Plant -Date Ranges -Execute .It will list you compoenent and production orders which have been issued also .
You select the Top header -Change lay out option to play around and paint your information by draging Hiddin Column to display coulmn .
4.Goto CO46 also list you the materials for Production Order
5.COHV also you can check
6.MB25-Open reservation with compoenets for order
Hope this is clear
Regards
JH

Similar Messages

  • Help to get the Manufacturing order production across the days

    Hi,
    I need to use this function module 'MD_QUANTITY_DISTRIBUTION' to get the Production across the days.
    If any one of you used the Function module,please let me know the input to pass this function module.whatever the input i give it is going to dump.
    If not this function module,is there any approach to get the production across the days..by just passing process order's Start date and Finish  date.
    your help will be highly appreciated.
    Thanks & Regards
    Ravindra

    Hi,
    pl.try following SQL
    SELECT haou.organization_id
    ,haou.NAME, org_information1_meaning, org_information1
    FROM hr_organization_units_v haou
    ,hr_organization_information_v hoi
    WHERE haou.organization_id = hoi.organization_id
    AND hoi.org_information1 = 'WIP'
    HTH
    Sanjay

  • Any Mozilla product I install crashes at startup. The first window I see when I open a Mozilla product is the crash reporter. I have tried every possible solution but cannot open anything. It started with firefox. Can anyone please help?

    Hi there, as the question says, I cannot open any Mozilla product. I have tried to install firefox 3.6, older versions of Firefox, Firefox 4.0, Sea Monkey, Thunder Bird and Sun Bird. I have the same problem everytime. I open any of these programs and the first and the only window that appears is the crash reporter. I've tried opening it in Safe Mode and the same occurs. I have tried entirely uninstalling the products incuding the registry keys but no help. I shall post the detailed error reports, if they help solving this issue. Can you kindly look into this and find a solution as I use all of these Mozilla products and my life has been a hell since they've ben down.
    Seamonkey Error Report:
    Add-ons: [email protected]:2.0.4,{59c81df5-4b7a-477b-912d-4e0fdf64e5f2}:0.9.85,{f13b157f-b174-47e7-a34d-4815ddfdfeb8}:0.9.87.4,[email protected]:1.0,{972ce4c6-7e08-4474-a285-3208198ce6fd}:1.0
    BuildID: 20101123124820
    CrashTime: 1296412292
    InstallTime: 1296412283
    ProductName: SeaMonkey
    StartupTime: 1296412291
    Theme: classic/1.0
    Throttleable: 1
    URL:
    Vendor: Mozilla
    Version: 2.0.11
    This report also contains technical information about the state of the application when it crashed.
    Sunbird Error Report:
    Add-ons: [email protected]:1.2009p,{e2fda1a4-762b-4020-b5ad-a41df1933103}:1.0b1,{972ce4c6-7e08-4474-a285-3208198ce6fd}:2.0
    BuildID: 20091211101839
    CrashTime: 1296413028
    InstallTime: 1296411446
    ProductName: Sunbird
    SecondsSinceLastCrash: 1578
    StartupTime: 1296413025
    Theme: classic/1.0
    Throttleable: 1
    URL:
    Vendor: Mozilla
    Version: 1.0b1
    This report also contains technical information about the state of the application when it crashed.

    Did you find a solution?
    Same problem over here as well, FF 7 is ok but FF8 / FF9 and Thunderbird 8 / 9 crash on startup.
    They both work if I start them in safe mode with everything enabled.

  • A condition to avoid displaying a product with the same Product Name in a report

    hello,
     Is there a condition to avoid displaying contents of two similar product names in a subreport?
     here is the scenario:
    Need to display Parent information in a separate List - Good
    child Product information in Sub-report,
    I'm passing both ProductID and ParentName parameters into Sub-Report to display the contents of the sub-report. If there are no similar Parent name, the sub-report works fine. But if there are similar ParentName, my sub-report
    starts listing all Products from the parent name.
      example
        Parent Product 1 ->  
                        Sulphate
                        Product_ID -> xx345
                        child Product1 ->  SulPhur (details...)  in a SubReport
      Parent Product 2 ->
                       Sulphate
                          Product_ID -> xx3342
                          Child Product1 -> Sulphuric Acid (details...) in  a SubReport

    Hi xitum,
    Per my understanding that both the subreport and the main report contains the field "ProductID" and "ProductName", and some of the ProductID will map the same ProductName which will display some duplicate subreport in the list like below,
    right?
    I have used some sample data as below and you can see when the different ProductID have the same values of "ProductName" and "Amount" and some other field value, it will display all the duplicate information
    in the subreport when add the main report in a list:
    ProductID   ProductName  Amount:
        1               ZXITest         220
        2               ZXITest         220
        3               ZXITest2       100
        4               ZXITest3       200
    If this is the case, please reference to the similar case in below thread which include details steps about how to do the deduplicate:
    how to avoid duplicate displaying a chart in a list
    If I have some misunderstanding, please try to provide some snapshot of the unexpect result you have got and more details information about the expect result you want.
    Regards,
    Vicky Liu
    Vicky Liu
    TechNet Community Support

  • In production order the cost analysis report  is not displaying correct

    Hi,
       when i create production order and do some posting activities i could not see the GR  cost row  details in the cost trend report in the production order.
    i could see the goods issue, confirmations and overhead rows segments in it. but i could not see the goods receipt tab in the <b>cost trend report .</b> where the implication lies can u suggest.
    regards
    madan

    Hi,
    In t.code oplr (order type dependent parameters) check in the controlling tab if you have given the costing variant as PPP2 for the Actual cost calculation & PPP1 for the planned cost for your order type.
    Regards,
    SDs

  • In the report we have to display DAY DESCRIPTION(Ex:Monday,Sunday,...)

    In the report we have to display DAY DESCRIPTION(Ex:Monday,Sunday,...)in  columns. How to get it? Can anyone help me?
    Thanks in Advance

    If we put calday in dril down we can display mm/dd/yyyy formate. Instead of this we have to display monday,tuesday,wednesday etc. corresponding to that date.
    In the repot level if i go to properties there is no option for key and text. i think time charecteristics don't have that type of option.
    If any doughts plz let me know
    thanks 4 ur reply

  • How to find out all the reports in production, ran how many times?

    Hi experts,
    I like to find out all the reports in production, ran how many time and by which user. Can I use st03n for this? if yes how and where to go?
    Thanks in advance.
    Sharat.

    Hi,
    You can use the statistics Cube 0BWTCT_C02. To get the Frequency of how many times a report has been executed, drill down the particular report by 0CALDAY and the frequency in 0FREQUENCY Keyfigure.
    Make sure the Cube is loaded,
    Thanks & Regards,
    Namrata

  • IOS 7 Calendar on iPad I cannot go from month view to day view. When I tap on the day of the month nothing happens.

    I use to be able to look at my month in the month view and when I wanted to make an appointment for a specific day I just tapped that day and it would open up the day and I could add my appointment to the time slot I wanted. Now when I am in month view and I tap on the day I want to make an appointment it does nothing. If I hold my finger on the day it creates an All Day event which is not what I want to do and even if I add a start time to the event, I don't know what times I have available on that day because the Day view hasn't opened. This is extremely frustrating. On my iphone it works properly...I can go from month view to day view by tapping on the day I want to view. Why can't I do this on my iPad?? If I could go back to ios 6 I would, calendar is not impressive at all!!
    Please help with any suggestions or PLEASE APPLE.....FIX THIS!!!

    I just tested, and this unfortunately still seems to be a bug in the latest iOS 7.1 release of the Calendar on the iPad, which is too bad since the release notes suggest that this iOS update included both bug fixes and enhancements to the Calendar.
    To my knowledge the bug has never been an issue on the iPhone version of the Calendar which behaves exactly as you would expect it should.
    It seems inconcievable given the obvious broken-ness of the current behavior coupled with what I would expect is a massive number of people who use the Calendar on the iPad, but is it possible that this bug isn't on Apple's radar?
    I'm happy to submit a bug report; does anyone know offhand the process for how the public can report bugs?
    This has been persistent in the product for nearly six months; it's well overdue that this bug be squashed.

  • Do we need antivirus for apple products especially the computers?

    do we need antivirus software to our apple gadgets or computers?

    Mac users often ask whether they should install "anti-virus" software. The answer usually given on ASC is "no." The answer is right, but it may give the wrong impression that there is no threat from what are loosely called "viruses." There  is a threat, and you need to educate yourself about it.
    1. This is a comment on what you should—and should not—do to protect yourself from malicious software ("malware") that circulates on the Internet and gets onto a computer as an unintended consequence of the user's actions. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the computer, or who has been able to log in to it remotely. That threat is in a different category, and there's no easy way to defend against it.
    The comment is long because the issue is complex. The key points are in sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    ☞ It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    ☞ It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    ☞ It can easily be disabled or overridden by the user.
    ☞ A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    ☞ An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    Apple has so far failed to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. These failures don't involve App Store products, however.
    For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. Malware is a problem of human behavior, and a technological fix is not going to solve it. Trusting software to protect you will only make you more vulnerable.
    The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the scam artists. If you're smarter than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
    Software from an untrustworthy source
    ☞ Software of any kind is distributed via BitTorrent, or Usenet, or on a website that also distributes pirated music or movies.
    ☞ Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, or your browser, or any other software.
    ☞ Rogue websites such as Softonic and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    ☞ The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
    Software that is plainly illegal or does something illegal
    ☞ High-priced commercial software such as Photoshop is "cracked" or "free."
    ☞ An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission.
    Conditional or unsolicited offers from strangers
    ☞ A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    ☞ A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    ☞ You win a prize in a contest you never entered.
    ☞ Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
    ☞ A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    ☞ Anything online that you would expect to pay for is "free."
    Unexpected events
    ☞ A file is downloaded automatically when you visit a web page, with no other action on your part. Delete any such file without opening it.
    ☞ You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
    ☞ An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    ☞ Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" (AV) or "Internet security" products for the Mac, as they are all worse than useless. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
    Why shouldn't you use commercial AV products?
    ☞ To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. This technique is a proven failure, as a major AV software vendor has admitted. Most attacks are "zero-day"—that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry is coming to the realization that traditional AV software is worthless.
    ☞ Its design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere. In order to meet that nonexistent threat, commercial AV software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    ☞ By modifying the operating system, the software may also create weaknesses that could be exploited by malware attackers.
    ☞ Most importantly, a false sense of security is dangerous.
    8. An AV product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject low-level code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An AV app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful, if at all, only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware.
    Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else. A malicious attachment in email is usually easy to recognize by the name alone. An actual example:
    London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
    You don't need software to tell you that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's no reason to use recognition software unless an organizational policy requires it. Windows malware is so widespread that you should assume it's in every email attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may serve a purpose if it satisfies an ill-informed network administrator who says you must run some kind of AV application. It's free and it won't handicap the system.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user, you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither can you assume that you will always be safe from exploitation, no matter what you do. Navigating the Internet is like walking the streets of a big city. It's as safe or as dangerous as you choose to make it. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • Hello, my Ipad was stolen about a week ago, I activated the "find my iPhone" app, however it says my Ipad is offline since the day it was stolen, so does anyone know:

    Hello, my Ipad was stolen about a week ago, I activated the "find my iPhone" app, however it says my Ipad is offline since the day it was stolen,  does anyone know…:
    1. Is there another way I can track its location, or more importantly have the information stored on my Ipad erased ASAP?
    2. Taking into consideration I blocked the iPad using the find my iPhone app, is there anyway the iPad can be used? Can someone erase all the data, my itunes account, reset all settings etc.? before connecting online?
    3. How can I recover my photos? I already signed in to icloud on my PC and I have no "Photo" icon, does this mean that they are lost?
    Thank you!

    What To Do If Your iDevice or Computer Is Lost Or Stolen
    iPhone, iPod Touch, and iPad
    If you activated Find My Phone before it was lost or stolen, you can track it only if Wi-Fi is enabled on the device. What you cannot do is track your device using a serial number or other identifying number. You cannot expect Apple or anyone else to find your device for you. You cannot recover your loss unless you insure your device for such loss. It is not covered by your warranty.
    If your iPhone, iPod, iPod Touch, or iPad is lost or stolen what do you do? There are things you should have done in advance - before you lost it or it was stolen - and some things to do after the fact. Here are some suggestions:
    This link, Re: Help! I misplaced / lost my iPhone 5 today morning in delta Chelsea hotel downtown an I am not able to track it. Please help!, has some good advice regarding your options when your iDevice is lost or stolen.
      1. Reporting a lost or stolen Apple product
      2. Find my lost iPod Touch
      3. AT&T. Sprint, and Verizon can block stolen phones/tablets
      4. What-To-Do-When-Iphone-Is-Stolen
      5. What to do if your iOS device is lost or stolen
      6. 6 Ways to Track and Recover Your Lost/Stolen iPhone
      7. Find My iPhone
      8. Report Stolen iPad | Stolen Lost Found Online
    It pays to be proactive by following the advice on using Find My Phone before you lose your device:
      1. Find My iPhone
      2. Setup your iDevice on iCloud
      3. OS X Lion/Mountain Lion- About Find My Mac
      4. How To Set Up Free Find Your iPhone (Even on Unsupported Devices)
    Mac Computer
           Find My Mac can be used from Find My Phone at iCloud.com and via Find
           My Phone on your iDevice.
          The following is third-party anti-theft software:
               1.  STEM 2.1
               2.  MacPhoneHome 3.5
               3.  MacTrack 7.5.0
               4.  VUWER 1.7
               5.  Sneaky Bastar* 0.2.0
               6.  Undercover 5.1.1
               7.  LoJack for Laptops
               8. Hidden 2.0
               9. Prey 0.6.2

  • Custom eventing  for reporting --- am i using the correct ResourceEvent?

    Hi All,
    I am using a web content management tool which stores all the content created through the tool in /documents repository . This content is published in the portal under various roles  . I am working on a report to generate and report the hit counts for the pages in this repository . I have written a Km service that subscribes to GET_TEMPLATE event to generate these statistics.
    The problem i am facing is this . When i navigate through the KM folder structure to a given page in a subfolder and do a preview of the page content , the hitcount is incremented and the report reflects this increase . However if i navigate to the role where the content is published and view the content from the role , the page hit count is not incremented and the report does not show the increment .
    My questions are
    1) Do i need to write a custom KM event that notifies the repository broker about
        the page access through the roles?
    2) Is there any other standard event to which i can subscribe to get this page hit count.
    Any helpful answers will be rewarded.
    regards
    Subra

    Hi Subra,
    > is there any way to know if the tool is raising any event
    As I have been one of the developers, I can report that the tool definitely does not raise such an event explicitely. But as said above, it also shouldn't do this, as it shouldn't be needed. In addition, for the display the tool redirects to a KM navigation iView, which normally should lead to the expected event risen anyhow.
    But if it really doesn't work, you still have the option to ask btexx to check if this is a shortcoming on SAP side - which in the interest of a smooth working product should be tracked, maybe worked around...
    About the caching I can report that there is also no caching used at the moment for the display. This may change one day, for this in fact it would make sense to raise the event (even if the resource isn't called from the framework, but to enable such kind of statistics, if they won't be part of the product one day anyhow).
    Hope it helps
    Detlev
    Message was edited by:
            Detlev Beutner
    One additional remark for all people involved: I just remember to have read about the same "missing" event on SDN, but I never checked this in the end. It <i>might</i> be that the navigation iView only throws the getChildren event, as for other resources than XML forms elements, it only renders the name of the resource, not it's (or part of it's) content (so the content doesn't get accessed). This also would make sense as normally the access to the <i>Show</i> form could be differentiated from the access to the <i>RenderListItem</i> form.

  • Firefox crashes several times during the day

    Hi, my new installed firefox crashes about every hour during the day.
    All my plugings are up to date.
    I already reinstalled it.
    I don't surf very much with it, just have 2 sites of forex broker open.
    What is the problem?
    What can i do?
    Thanks!
    Here is my las crash report:
    Signature js::jit::BaselineScript::nativeCodeForPC(JSScript*, unsigned char*, js::jit::PCMappingSlotInfo*) More Reports Search
    UUID dbf6f1f4-cfda-493f-a3f6-fb28d2141014
    Date Processed 2014-10-14 10:55:31.142917
    Uptime 5885
    Last Crash 5891 seconds before submission
    Install Age 254134 since version was first installed.
    Install Time 2014-10-11 12:19:57
    Product Firefox
    Version 32.0.3
    Build ID 20140923175406
    Release Channel release
    OS Windows NT
    OS Version 5.1.2600 Service Pack 3
    Build Architecture x86
    Build Architecture Info GenuineIntel family 6 model 23 stepping 7 | 4
    Crash Reason EXCEPTION_ACCESS_VIOLATION_READ
    Crash Address 0x44
    User Comments
    App Notes
    AdapterVendorID: 0x10de, AdapterDeviceID: 0x0622, AdapterSubsysID: 12781462, AdapterDriverVersion: 6.14.13.4052
    D3D10 Layers? D3D10 Layers- D3D9 Layers? D3D9 Layers+ D3D9 Layers-
    Processor Notes sp-processor07_phx1_mozilla_com.18173:2012; HybridCrashProcessor
    EMCheckCompatibility
    True
    Winsock LSP
    MSAFD Tcpip [TCP/IP] : 2 : 1 :
    MSAFD Tcpip [UDP/IP] : 2 : 2 :
    MSAFD Tcpip [RAW/IP] : 2 : 3 :
    RSVP UDP Service Provider : 6 : 2 :
    RSVP TCP Service Provider : 6 : 1 :
    MSAFD NetBIOS [\Device\NetBT_Tcpip_{C7B77D52-3A47-4A62-84AE-52575A38D43E}] SEQPACKET 8 : 2 : 5 :
    MSAFD NetBIOS [\Device\NetBT_Tcpip_{C7B77D52-3A47-4A62-84AE-52575A38D43E}] DATAGRAM 8 : 2 : 2 :
    MSAFD NetBIOS [\Device\NetBT_Tcpip_{C19A52F4-0B94-4539-96E0-1E2B6032772A}] SEQPACKET 7 : 2 : 5 :
    MSAFD NetBIOS [\Device\NetBT_Tcpip_{C19A52F4-0B94-4539-96E0-1E2B6032772A}] DATAGRAM 7 : 2 : 2 :
    MSAFD NetBIOS [\Device\NetBT_Tcpip_{35F52110-C89E-45C1-A1DE-B32601CDF107}] SEQPACKET 6 : 2 : 5 :
    MSAFD NetBIOS [\Device\NetBT_Tcpip_{35F52110-C89E-45C1-A1DE-B32601CDF107}] DATAGRAM 6 : 2 : 2 :
    MSAFD NetBIOS [\Device\NetBT_Tcpip_{E3127C94-4699-435A-9291-3343C267995F}] SEQPACKET 5 : 2 : 5 :
    MSAFD NetBIOS [\Device\NetBT_Tcpip_{E3127C94-4699-435A-9291-3343C267995F}] DATAGRAM 5 : 2 : 2 :
    MSAFD NetBIOS [\Device\NetBT_Tcpip_{97B304F7-F7F1-47F8-880B-9F16097CDBAC}] SEQPACKET 4 : 2 : 5 :
    MSAFD NetBIOS [\Device\NetBT_Tcpip_{97B304F7-F7F1-47F8-880B-9F16097CDBAC}] DATAGRAM 4 : 2 : 2 :
    MSAFD NetBIOS [\Device\NetBT_Tcpip_{E50253D1-1A2B-4BCC-923F-43F8A37C0D4D}] SEQPACKET 3 : 2 : 5 :
    MSAFD NetBIOS [\Device\NetBT_Tcpip_{E50253D1-1A2B-4BCC-923F-43F8A37C0D4D}] DATAGRAM 3 : 2 : 2 :
    MSAFD NetBIOS [\Device\NetBT_Tcpip_{02D45D66-5F54-40C2-9221-775E31368218}] SEQPACKET 0 : 2 : 5 :
    MSAFD NetBIOS [\Device\NetBT_Tcpip_{02D45D66-5F54-40C2-9221-775E31368218}] DATAGRAM 0 : 2 : 2 :
    MSAFD NetBIOS [\Device\NetBT_Tcpip_{2317B768-D17B-484F-9C3F-4A9E482BCDD7}] SEQPACKET 1 : 2 : 5 :
    MSAFD NetBIOS [\Device\NetBT_Tcpip_{2317B768-D17B-484F-9C3F-4A9E482BCDD7}] DATAGRAM 1 : 2 : 2 :
    MSAFD NetBIOS [\Device\NetBT_Tcpip_{132F393D-962E-4D83-BBA9-19F11CCEEB44}] SEQPACKET 2 : 2 : 5 :
    MSAFD NetBIOS [\Device\NetBT_Tcpip_{132F393D-962E-4D83-BBA9-19F11CCEEB44}] DATAGRAM 2 : 2 : 2 :
    Adapter Vendor ID
    0x10de
    Adapter Device ID
    0x0622
    Total Virtual Memory
    2147352576
    Available Virtual Memory
    1497427968
    System Memory Use Percentage
    91
    Available Page File
    3977166848
    Available Physical Memory
    285016064

    '''[https://support.mozilla.org/en-US/kb/troubleshoot-firefox-issues-using-safe-mode Start Firefox in Safe Mode]''' {web link}
    While you are in safe mode;
    Type '''about:preferences'''<Enter> in the address bar
    Select '''Advanced > General.'''
    Look for and turn off '''Use Hardware Acceleration'''.
    Poke around safe web sites. Are there any problems?
    In the address bar, type '''about:crashes. Note:''' If any reports do not
    have '''BP''' in front of the numbers, click it and select '''Submit'''.
    Using your mouse, '''mark''' the most '''resent 7 - 10''' crash reports, and
    '''copy''' them. Now go to the reply box below and '''paste''' them in.

  • Macbook (mid 2012, 9,2) has very poor performance since the day I bought it (less than 2 months ago)

    Problem description:
    My macbook is extremely slow since the day I bought it (which was less than 2 months ago)…Came preinstalled with Mavericks and 4GB of RAM. Upgraded it to 16GB hoping that would help, but that did very little…then upgraded to Yosemite. That just made it worse. Formatted the whole thing and installed clean Yosemite. Still, every time I right click, I get the rainbow loading icon and it hangs. Every time I open any file, or click any app, it hangs for a few seconds, again with a loading icon. Every time I play a song on iTunes or even VLC for that matter, it stops multiple times, every few seconds. Feels like it’s “buffering” while I’m playing a song off my hard drive. It’s been bothering me for too long now…Any idea what the issue is exactly?
    EtreCheck version: 2.0.11 (98)
    Report generated 12 November 2014 23:55:47 GMT-3
    Hardware Information: ℹ️
      MacBook Pro (13-inch, Mid 2012) (Verified)
      MacBook Pro - model: MacBookPro9,2
      1 2.5 GHz Intel Core i5 CPU: 2-core
      16 GB RAM Upgradeable
      BANK 0/DIMM0
      8 GB DDR3 1600 MHz ok
      BANK 1/DIMM0
      8 GB DDR3 1600 MHz ok
      Bluetooth: Good - Handoff/Airdrop2 supported
      Wireless:  en1: 802.11 a/b/g/n
    Video Information: ℹ️
      Intel HD Graphics 4000 -
      Color LCD 1920 x 1080
      LCD TV spdisplays_1080p
    System Software: ℹ️
      OS X 10.10 (14A389) - Uptime: 2 days 10:0:44
    Disk Information: ℹ️
      APPLE HDD TOSHIBA MK5065GSXF disk0 : (500.11 GB)
      S.M.A.R.T. Status: Verified
      EFI (disk0s1) <not mounted> : 210 MB
      Recovery HD (disk0s3) <not mounted>  [Recovery]: 650 MB
      Macintosh HD (disk1) /  [Startup]: 498.88 GB (374.54 GB free)
      Core Storage: disk0s2 499.25 GB Online
      MATSHITADVD-R   UJ-8A8 
    USB Information: ℹ️
      SIGMACHIP USB Keyboard
      Apple Inc. FaceTime HD Camera (Built-in)
      Apple Inc. BRCM20702 Hub
      Apple Inc. Bluetooth USB Host Controller
      Apple Inc. Apple Internal Keyboard / Trackpad
      Apple Computer, Inc. IR Receiver
    Thunderbolt Information: ℹ️
      Apple Inc. thunderbolt_bus
    Configuration files: ℹ️
      /etc/hosts - Count: 6
    Gatekeeper: ℹ️
      Anywhere
    Kernel Extensions: ℹ️
      /Library/Application Support/VirtualBox
      [loaded] org.virtualbox.kext.VBoxDrv (4.3.18) Support
      [loaded] org.virtualbox.kext.VBoxNetAdp (4.3.18) Support
      [loaded] org.virtualbox.kext.VBoxNetFlt (4.3.18) Support
      [loaded] org.virtualbox.kext.VBoxUSB (4.3.18) Support
    Startup Items: ℹ️
      TuxeraNTFSUnmountHelper: Path: /Library/StartupItems/TuxeraNTFSUnmountHelper
      Startup items are obsolete and will not work in future versions of OS X
    Launch Agents: ℹ️
      [not loaded] com.adobe.AAM.Updater-1.0.plist Support
      [running] com.teamviewer.teamviewer.plist Support
      [running] com.teamviewer.teamviewer_desktop.plist Support
    Launch Daemons: ℹ️
      [loaded] com.macpaw.CleanMyMac2.Agent.plist Support
      [loaded] com.microsoft.office.licensing.helper.plist Support
      [loaded] com.teamviewer.Helper.plist Support
      [running] com.teamviewer.teamviewer_service.plist Support
      [not loaded] org.virtualbox.startup.plist Support
    User Launch Agents: ℹ️
      [loaded] com.adobe.ARM.[...].plist Support
      [loaded] com.google.keystone.agent.plist Support
      [loaded] com.macpaw.CleanMyMac2Helper.diskSpaceWatcher.plist Support
      [loaded] com.macpaw.CleanMyMac2Helper.scheduledScan.plist Support
      [loaded] com.macpaw.CleanMyMac2Helper.trashWatcher.plist Support
      [not loaded] org.virtualbox.vboxwebsrv.plist Support
    User Login Items: ℹ️
      iTunesHelper Application (/Applications/iTunes.app/Contents/MacOS/iTunesHelper.app)
      Dropbox Application (/Applications/Dropbox.app)
    Internet Plug-ins: ℹ️
      AdobePDFViewerNPAPI: Version: 11.0.0 - SDK 10.6 Support
      SharePointBrowserPlugin: Version: 14.4.5 - SDK 10.6 Support
      AdobePDFViewer: Version: 11.0.0 - SDK 10.6 Support
      QuickTime Plugin: Version: 7.7.3
      AdobeAAMDetect: Version: AdobeAAMDetect 1.0.0.0 - SDK 10.6 Support
      Default Browser: Version: 600 - SDK 10.10
    3rd Party Preference Panes: ℹ️
      Tuxera NTFS  Support
    Time Machine: ℹ️
      Time Machine not configured!
    Top Processes by CPU: ℹ️
          20% mds
          6% Google Chrome
          4% WindowServer
          1% hidd
          0% Dropbox
    Top Processes by Memory: ℹ️
      481 MB Coda 2
      258 MB Google Chrome
      189 MB softwareupdated
      189 MB loginwindow
      189 MB Finder
    Virtual Memory Information: ℹ️
      5.71 GB Free RAM
      7.22 GB Active RAM
      2.63 GB Inactive RAM
      1.62 GB Wired RAM
      25.24 GB Page-ins
      0 B Page-outs

    If it has been slow since it came out of the box, it's probably defective. The warranty entitles you to complimentary phone support for the first 90 days of ownership.

  • Report for Production order list

    Dear all,
    I need your help..
    we have two plants in which we divided total qty of customer order for production
    now i want a list in which i got the details like which sale order and how much qty we punched in plant one and plant 2
    to compare total valve produced for customer
    how to find such kind of report..?
    which t code is helpfull.
    Neha

    If you're working with a MTO stg. (eg: 20), then the sales order details will be linked to the production order & you can then use COOIS report by specifying the sales order nos.
    But if you're working in a MTS environment, then there will not be a specific link between the Production order & the sales order, so if you have maintained the SO nos. in some field, then you will have to execute the COOIS report & then use the filter option on the field where you've maintained the SO nos.

  • Report for production order with actual and target cost for each

    Hi
    Is there any report that gives me the list of all production orders in a month with its respective actual and target costs?
    I can use COOIS to get a list of production orders, then double click on the prod order, then click on goto and then to cost analyis.. but can i avoid going through all this and get a report with the details i need?
    thanks in advance

    Thanks a lot for that.
    I'm a little confused with the columns in the report.
    Which columns should I keep for my requirement? -
    Production Order
    Total Target Cost
    Total Actual Cost
    Total Actual Qty
    Total Target Qty
    Thanks

Maybe you are looking for

  • Premiere Elements 11 won't open

    Installed Premiere Elements 11 but it won't open. Have uninstalled and reinstalled but still no luck.

  • ITunes store does not match that of the gift card...

    I got a gift card from Germany and live in Switzerland. Apple support recommends to give it away to somebody living in Germany or so... Not very helpfull ! In internet there are some blogs how to install an account in a foreign country, but you have

  • Cannot Remove Username and Password from Mail settings in WebLogic for 11g

    I have changed my mail server settings in EM->BI->Coreapplication->deployments->mail from an SMTP server using authentication to one without. However, when I try to remove the username and password, then hit apply and activate changes, the UN and PW

  • Objectlevel Security in SAP BI

    Hi Gurus, Implementation of Object level security in BI system. Customer is looking to Implement BI security model for a new piece of functionality that they are setting up in BI (Commissions processing) specifically in the area of SD (Sales Distict,

  • Saving sets of adjustments for later and/or multiple use?

    Hi, I'd like to create a small library of numerous personal sets of adjustments for easy later use with other photos (taken with the same camera). What's the best way to do this?  I have found these instructions https://discussions.apple.com/message/